Class information for:
Level 1: 72 BIT KEY//ABNORMAL MALICIOUS CODE//ABNORMAL NETWORK CONNECTION

Basic class information

Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
12 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE 1181119
36 3       COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, HARDWARE & ARCHITECTURE//COMPUTER SCIENCE, INFORMATION SYSTEMS 110484
1587 2             DIGITAL INVESTIGATION//COMPUTERS & SECURITY//INTRUSION DETECTION 7461
29557 1                   72 BIT KEY//ABNORMAL MALICIOUS CODE//ABNORMAL NETWORK CONNECTION 201

Terms with highest relevance score



rank Category termType chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 72 BIT KEY authKW 156800 0% 100% 1
2 ABNORMAL MALICIOUS CODE authKW 156800 0% 100% 1
3 ABNORMAL NETWORK CONNECTION authKW 156800 0% 100% 1
4 ABUSE OF PROTOCOLS authKW 156800 0% 100% 1
5 ACCESS CONTROL TECHNIQUES authKW 156800 0% 100% 1
6 ACCESS CONTROL TO NETWORK RESOURCES authKW 156800 0% 100% 1
7 AEGEAN UNIT address 156800 0% 100% 1
8 BLP BELL LAPADULA SECURITY MODEL authKW 156800 0% 100% 1
9 BUILDING PRODUCT INFORMATION authKW 156800 0% 100% 1
10 CIPHER FEED BACK CFB MODE authKW 156800 0% 100% 1

Web of Science journal categories



chi_square_rank Category chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 Computer Science, Hardware & Architecture 5814 30% 0% 61
2 COMPUTER APPLICATIONS & CYBERNETICS 3813 4% 0% 8
3 Computer Science, Software Engineering 2299 25% 0% 50
4 Computer Science, Information Systems 1304 21% 0% 43
5 Computer Science, Theory & Methods 1298 22% 0% 45
6 Telecommunications 958 19% 0% 38
7 Multidisciplinary Sciences 189 5% 0% 11
8 Criminology & Penology 105 2% 0% 5
9 Information Science & Library Science 42 2% 0% 5
10 Engineering, Electrical & Electronic 41 11% 0% 22

Address terms



chi_square_rank term chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 AEGEAN UNIT 156800 0% 100% 1
2 DEC INCLUDED DEV PROJECTS 156800 0% 100% 1
3 GRP DEVELOPING TOPS 20 156800 0% 100% 1
4 SALFORD LAW 156800 0% 100% 1
5 SECUR PRACTICE 156800 0% 100% 1
6 COMP NETWORK SECUR 78399 0% 50% 1
7 HELATHCARE INFORMAT MANAGEMENT 78399 0% 50% 1
8 INFORMAT TECHNOL OPERAT 39199 0% 25% 1
9 SERV DIDATT SCI 39199 0% 25% 1
10 SUN MICROSYST S 31358 0% 20% 1

Journals



chi_square_rank term chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 AT&T TECHNICAL JOURNAL 122131 10% 4% 21
2 IEEE SECURITY & PRIVACY 15097 4% 1% 8
3 INFORMATION AGE 14849 1% 3% 3
4 ABACUS-NEW YORK 13934 1% 4% 2
5 AMERICAN SCIENTIST 12911 5% 1% 11
6 COMMUNICATIONS OF THE ACM 10644 8% 0% 17
7 COMPUTERS & SECURITY 7830 4% 1% 8
8 COMPUTER DECISIONS 7375 1% 2% 2
9 AT&T BELL LABORATORIES TECHNICAL JOURNAL 6965 1% 2% 2
10 INTERFACES IN COMPUTING 4610 0% 3% 1

Author Key Words



chi_square_rank term chi_square shrOfCwithTerm shrOfTermInClass termInClass LCSH search Wikipedia search
1 72 BIT KEY 156800 0% 100% 1 Search 72+BIT+KEY Search 72+BIT+KEY
2 ABNORMAL MALICIOUS CODE 156800 0% 100% 1 Search ABNORMAL+MALICIOUS+CODE Search ABNORMAL+MALICIOUS+CODE
3 ABNORMAL NETWORK CONNECTION 156800 0% 100% 1 Search ABNORMAL+NETWORK+CONNECTION Search ABNORMAL+NETWORK+CONNECTION
4 ABUSE OF PROTOCOLS 156800 0% 100% 1 Search ABUSE+OF+PROTOCOLS Search ABUSE+OF+PROTOCOLS
5 ACCESS CONTROL TECHNIQUES 156800 0% 100% 1 Search ACCESS+CONTROL+TECHNIQUES Search ACCESS+CONTROL+TECHNIQUES
6 ACCESS CONTROL TO NETWORK RESOURCES 156800 0% 100% 1 Search ACCESS+CONTROL+TO+NETWORK+RESOURCES Search ACCESS+CONTROL+TO+NETWORK+RESOURCES
7 BLP BELL LAPADULA SECURITY MODEL 156800 0% 100% 1 Search BLP+BELL+LAPADULA+SECURITY+MODEL Search BLP+BELL+LAPADULA+SECURITY+MODEL
8 BUILDING PRODUCT INFORMATION 156800 0% 100% 1 Search BUILDING+PRODUCT+INFORMATION Search BUILDING+PRODUCT+INFORMATION
9 CIPHER FEED BACK CFB MODE 156800 0% 100% 1 Search CIPHER+FEED+BACK+CFB+MODE Search CIPHER+FEED+BACK+CFB+MODE
10 COMPUTER NETWORK DEPENDABILITY 156800 0% 100% 1 Search COMPUTER+NETWORK+DEPENDABILITY Search COMPUTER+NETWORK+DEPENDABILITY

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.

Classes with closest relation at Level 1



rank cluster_id2 link
1 37911 FUNCT TERMINAL CIRCUITS GRP//DATA NETWORK EXPLORATORY DEV//INFRARED FILM THICKNESS MONITOR
2 38255 SHARED RESOURCE MATRIX//BIOMEDICAL DECISION MAKING//COMMUNICATING CONCURRENT KLEENE ALGEBRA
3 20141 COMPUTER VIRUS//MALWARE PROPAGATION//WORM PROPAGATION
4 36109 GRP SOFTWARE SCI FORMAL METHODS//PHILOSOPHY OF COMPUTER SCIENCE//A PRIORI DISCIPLINE
5 36381 CONCURRENCY AND SYNCHRONIZATION//CONVENIO FARM BIOQUIM ESPIRITO SANTO//DATA CONSUMER
6 37160 TRI TREE//A PRIORI PIVOTING//ADAPTIVE RECOARSEMENTS
7 8097 COMPUTERS & SECURITY//INFORMATION SECURITY//INFORMATION SECURITY MANAGEMENT
8 28910 AUTHENTICATED DATA STRUCTURES//CHAIR MOBILE COMMERCE MULTILATERAL SECUR//BRIDGE CERTIFICATE AUTHORITY
9 36819 DENIABLE AUTHENTICATION//DENIABLE AUTHENTICATION PROTOCOL//E MAIL PROTOCOL
10 31281 CONDITION MONITORING MAINTENANCE//AGENT COOPERATION DISTRIBUTED PROBLEM SOLVING//AGENT COOPERATION TEAMWORK

Go to start page